The “P” in EPN stands for “Programmable,” as in “Evolved Programmable Network” and Cisco has just made the “P” easier to achieve to help drive services to the cloud. We’ve now contributed Basic ConfD, a free version of our powerful ConfD by Tail-f management agent software to the networking industry. Tail-f joined Cisco last summer and this announcement demonstrates Cisco’s commitment to not only embrace but also drive open standards in the best interest of the entire ecosystem. Read More »
Written by Igor Dayen, SP Product and Solutions Marketing
If you had a chance to join us at Cisco Live Milan last month, thank you very much for making this another exciting event for all of us. If you missed out being there in person, let me give you a brief summary of the highlights. Milan is the main industrial, commercial, and financial center of Italy and a leading global city where the EXPO 2015 will take place. What could be better than such a city to host the Cisco Live 2015 event! It proved to be fertile grounds for driving innovations with our service provider customers and partners. Our exhibition was structured to tell the story of the Open Network Strategy by presenting over 15 technology and business demos. We also brought the newest routers and switches with us to showcase the latest innovations that service providers can start deploying today. Last but not least we have teamed up with the DevNet area where attendees could get their hands on developing applications and learning on virtualization, orchestration, and automation. Our service provider booth of the Cisco Campus in the World of Solutions was very busy: “standing room only” and so many insightful conversations were conversations around the NFV (Network Functions Virtualization) and the SDN (Software Defined Networks), as pillars for delivering cloud services and an automated networking handling respectively, have matured significantly and are ready for prime time. Read More »
Tags: #DevNet, application virtualization, autonomic networking, business transformation, capex, cisco esp, cisco live, Cisco Live Milan, Cisco Open Network Environment, Cisco SDN, Cloud VPN, epn, esp, evolved programmable network, evolved services platform, MOI, monetization, netconf, network function virtualization, Network Service Orchestration, network virtualization, NFV, NSO, nV technology, open network strategy, Operational Simplicity, opex, SDN, segment routing, service providers, software defined networking, SP, virtualized Management services, vMS
The annual Cisco® Visual Networking Index (VNI) Global Mobile Data Forecast, just out, once again shows the phenomenal growth expected in the mobile industry, e.g. more than 5.2 billion global mobile users by 2019 and 10-fold mobile traffic growth over the next five years. See Thomas Barnett’s blog to learn more.
For me the interest is to look into the APAC specific trends and the unique characteristics of this very diverse region. APAC averages show trends similar to the Global view, but let’s compare super developed Japan with the developing markets in Indonesia and India also:
Cisco VNI Mobile Data APAC Statistics for 2014
Some observations on demand; Developed markets are already dominated by smart devices and their large data consumption, but driven by new connections (multiple devices per user and M2M(machine 2 machine)) demand still grows. Developing markets are still migrating Read More »
Guest Blog by Pat Chou, TMG Product Manager
Since the introduction of the Cisco’s 40G QSFP BiDi (Quad Small Form-Factor Pluggable Bidirectional module), we’ve seen phenomenal growth and adoption. I guess people do see the benefit.
What’s that? You haven’t heard?
…Ok, let’s say you’re in charge of a data center and your boss reminds you that streaming video and IoT devices are all the rage and if you don’t keep up with bandwidth demand, you’re toast. You have 10G links that use 10G SFP+ SR transceivers at the aggregation layer. You upgrade your switches or linecards to ones that have 40G QSFP ports like the Nexus series switches. Read More »
In the more than ten years, I have worked in developing security solutions, I have witnessed the steady evolution of security threats and the incredible strides made to combat them. Recent high profile security breaches have shown that a breach in security can have serious consequences.. It can lead to loss or destruction of business assets, bad publicity and its associated effect on a company’s brand, hefty regulatory fines, disruption of services and costs associated with numerous lawsuits. The main task of a hacker is to access business assets through the network without being detected. The threats are normally cloaked within ubiquitous traffic flows such as web or email. Whatever the nature of a threat, an attack leaves signatures behind that can be used to “un-cloak” the threat. Threat defense and visibility is the watchword.
It has been exhausting to many of us, to be constantly engaged in the never ending cat and mouse game we play to manage and detect cyber threats. When it comes to securing private and public clouds, a new generation of Read More »